Microsoft Intune provides robust management capabilities for macOS devices, enabling organizations to secure and configure Macs alongside Windows devices from a single console. This guide walks through the various enrollment methods available for macOS, helping you choose the right approach for your organization.
Overview
macOS enrollment in Intune offers three primary methods, each designed for different ownership and management scenarios:
| Enrollment Method | Best For | Management Level | User Privacy | Prerequisites |
|---|---|---|---|---|
| Automated Device Enrollment (ADE) | Corporate-owned, new devices | Full device management | Low | Apple Business Manager |
| Device Enrollment | Corporate-owned, existing devices | Full device management | Low | Company Portal app |
| User Enrollment | BYOD, personal devices | Managed partition only | High | Company Portal app |
Prerequisites
Before enrolling macOS devices, ensure you have the following:
Licensing Requirements:
- Microsoft Intune license (standalone or included with Microsoft 365 E3/E5, Business Premium)
- Azure AD Premium P1 for Conditional Access features
Apple Requirements:
- Apple Business Manager account (required for ADE, recommended for all)
- Apple MDM Push certificate configured in Intune
- macOS 12 (Monterey) or later
Administrative Access:
- Global Administrator or Intune Administrator role
- Access to Microsoft Intune admin center (intune.microsoft.com)
- Apple Business Manager administrator access (for ADE)
Recommended Preparation:
- Configure Apple MDM Push certificate
- Set up Apple Business Manager integration
- Create device compliance policies for macOS
- Prepare configuration profiles
Step 1: Configure Apple MDM Push Certificate
The Apple MDM Push certificate enables communication between Intune and macOS devices. This is required for all enrollment methods.
Create and Upload the Certificate
-
Sign in to the Microsoft Intune admin center: https://intune.microsoft.com
-
Navigate to Devices > Enrollment > Apple > Apple MDM Push Certificate
-
Select I agree to grant Microsoft permission to send data to Apple
-
Click Download your CSR to download the certificate signing request
- Save the file (IntuneCSR.csr) to a known location
-
Click Create your MDM push Certificate to open the Apple Push Certificates Portal
-
Sign in with your Apple ID (use a corporate Apple ID, not personal)
- This Apple ID will be needed for annual certificate renewal
-
Click Create a Certificate
-
Accept the Terms of Use
-
Click Choose File and select the CSR file downloaded from Intune
-
Click Upload
-
Click Download to save the certificate file (.pem)
-
Return to the Intune admin center
-
Enter the Apple ID used to create the certificate
-
Click Browse and select the downloaded .pem certificate file
-
Click Upload
Certificate Renewal Reminder
The Apple MDM Push certificate expires annually. Set a calendar reminder for renewal:
- Certificate expiration appears in Intune under Apple MDM Push Certificate
- Renew the certificate before expiration to avoid re-enrollment of all devices
- Use the same Apple ID for renewal to maintain device management
Step 2: Configure Apple Business Manager Integration (Recommended)
Apple Business Manager (ABM) enables Automated Device Enrollment and provides additional management capabilities.
Link Apple Business Manager to Intune
-
Sign in to Apple Business Manager: https://business.apple.com
-
Navigate to Settings > Device Management Settings
-
Click Add MDM Server
-
Enter a name for the server (e.g., "Microsoft Intune")
-
Check Allow this MDM server to release devices if desired
-
Click Save
-
Click Download Token to download the server token file
-
Return to the Intune admin center
-
Navigate to Devices > Enrollment > Apple > Enrollment program tokens
-
Click Add
-
Grant permission to Apple
-
Click Browse and select the token file downloaded from ABM
-
Click Add
Assign Devices to Intune in ABM
-
In Apple Business Manager, go to Devices
-
Select the devices you want to manage with Intune
-
Click Edit MDM Server
-
Select your Intune MDM server
-
Click Continue to assign devices
Devices will sync to Intune within minutes. Verify in Intune under Devices > Apple > iOS/iPadOS enrollment > Enrollment program tokens > [Your token] > Devices.
Method 1: Automated Device Enrollment (ADE)
Automated Device Enrollment provides the best experience for corporate-owned devices, enabling zero-touch deployment and supervision.
Step 1: Create an Enrollment Profile
-
In the Intune admin center, navigate to Devices > macOS > macOS enrollment
-
Select Enrollment program tokens
-
Click on your Apple Business Manager token
-
Select Profiles > Create profile > macOS
-
Enter a Name for the profile (e.g., "macOS Corporate Enrollment")
-
Enter a Description (optional)
Step 2: Configure Device Management Settings
Configure the following settings:
User Affinity:
- Enroll with User Affinity: Yes (associates device with a user, recommended for personal-use devices)
- Enroll without User Affinity: No (for shared or kiosk devices)
Authentication Method:
- Select Company Portal for modern authentication
- Or select Setup Assistant (legacy) for basic authentication
Locked enrollment: Yes (prevents users from removing management profile)
Await final configuration: Yes (recommended - holds device at Setup Assistant until all profiles are installed)
Step 3: Configure Setup Assistant Settings
Customize the out-of-box experience by showing or hiding Setup Assistant screens:
| Setting | Recommendation | Description |
|---|---|---|
| Department | Show | Displays organization name |
| Device Name | Hide | Uses naming template instead |
| Appearance | Hide | Skip light/dark mode selection |
| Apple ID | Show | Allow users to sign in with personal Apple ID |
| Privacy | Show | Displays privacy information |
| Restore | Hide | Prevents restoring from personal backup |
| Screen Time | Hide | Skip Screen Time setup |
| FileVault | Show | Enable disk encryption setup |
| iCloud Diagnostics | Hide | Skip diagnostic consent |
| Registration | Hide | Skip Apple registration |
| Accessibility | Show | Allow accessibility configuration |
| Siri | Hide | Skip Siri setup |
| Touch ID | Show | Allow biometric setup |
| Passcode | Show | Require device passcode setup |
Step 4: Assign Profile to Devices
-
Click Next to continue
-
Under Assignments, click Add groups or Add all devices
-
Select the device groups to target (or leave as All devices)
-
Click Next
-
Review settings and click Create
Step 5: Deploy Devices
-
Ship devices to users or configure in IT department
-
When the user turns on the Mac, it will:
- Connect to the internet
- Download the enrollment profile from Apple
- Display the customized Setup Assistant
- Prompt for Azure AD credentials
- Enroll in Intune
- Apply assigned policies and configurations
-
The Company Portal app will automatically install if configured
Step 6: Verify Enrollment
-
In Intune admin center, go to Devices > macOS > macOS devices
-
Locate the enrolled device
-
Verify:
- Enrollment type: Automated device enrollment
- Management state: Managed
- Compliance status: Compliant (after policies apply)
Method 2: Device Enrollment (Company Portal)
Device Enrollment allows users to enroll existing corporate-owned or dedicated macOS devices through the Company Portal app.
Step 1: Configure Enrollment Restrictions
-
Navigate to Devices > Enrollment > Enrollment device platform restrictions
-
Click on macOS restrictions or create a new restriction
-
Configure:
- Platform settings: Allow macOS enrollment
- Personally owned: Block (if only corporate devices should enroll)
- Minimum/Maximum OS version: Set version requirements
-
Assign to appropriate groups
Step 2: Install Company Portal on the Mac
Users can install Company Portal through multiple methods:
Option A: Direct Download
- Open Safari on the Mac
- Navigate to: https://go.microsoft.com/fwlink/?linkid=853070
- Download the Company Portal installer (.pkg)
- Double-click to install
Option B: App Store (if available)
- Open the App Store
- Search for "Intune Company Portal"
- Click Get to install
Step 3: Enroll the Device
-
Open the Company Portal app
-
Click Sign in and enter Azure AD credentials
-
Complete multi-factor authentication if prompted
-
Review the information about device enrollment
-
Click Begin to start enrollment
-
The enrollment process will:
- Download the management profile
- Prompt to allow installation of the profile
- Request administrator credentials for profile installation
-
When prompted, enter the Mac administrator password to authorize profile installation
-
Click Allow in System Settings when prompted to approve the MDM profile
Step 4: Approve MDM Profile in System Settings
macOS requires manual approval of MDM profiles:
-
A notification appears: "Profile installation required"
-
Open System Settings > Privacy & Security
-
Scroll down to Profiles (or Profiles & Device Management on older macOS)
-
Click on the Management Profile
-
Click Approve or Install
-
Enter administrator credentials if prompted
-
Return to Company Portal to verify enrollment completion
Step 5: Verify Device Enrollment
-
In the Company Portal app, the device should show as "Enrolled"
-
Check Device Details to see compliance status
-
In Intune admin center, verify the device appears under Devices > macOS > macOS devices
Method 3: User Enrollment (BYOD)
User Enrollment provides a privacy-focused enrollment method for personal devices, managing only corporate data without accessing personal information.
Step 1: Enable User Enrollment
-
Navigate to Devices > Enrollment > Apple > Apple enrollment types
-
Click Edit or create a new enrollment type profile
-
Configure:
- Name: macOS User Enrollment
- Enrollment type: User enrollment with Company Portal
- Targeted users: Select groups for BYOD users
-
Click Save
Step 2: User Enrollment Process
Users complete enrollment through Company Portal:
-
Install the Company Portal app
-
Sign in with Azure AD credentials
-
Select User enrollment when presented with enrollment options
-
Review privacy information (shows what IT can and cannot see)
-
Proceed with enrollment
-
macOS creates a separate managed APFS volume for corporate data
-
The MDM profile manages only the corporate partition
Step 3: Understand User Enrollment Limitations
User Enrollment has reduced management capabilities compared to Device Enrollment:
| Capability | Device Enrollment | User Enrollment |
|---|---|---|
| Remote wipe | Full device | Corporate data only |
| Passcode enforcement | Yes | Yes |
| Wi-Fi profiles | Yes | Yes |
| VPN profiles | Yes | Yes |
| Certificate deployment | Yes | Yes |
| App deployment | Yes | Yes (to managed partition) |
| Device restrictions | Yes | Limited |
| FileVault management | Yes | No |
| Kernel extension management | Yes | No |
| System extension management | Yes | No |
User Privacy in User Enrollment
IT administrators cannot see or access:
- Personal apps and app usage
- Personal browsing history
- Personal email, text messages, or phone calls
- Personal photos, videos, or files
- Device location (unless enabled by user)
- Device name (shows managed Apple ID instead)
Post-Enrollment Configuration
Deploy Configuration Profiles
After enrollment, deploy essential configuration profiles:
Security Settings:
- Navigate to Devices > macOS > Configuration profiles
- Create profiles for:
- FileVault encryption (Device Enrollment only)
- Firewall settings
- Password requirements
- Privacy preferences policy control
Productivity Settings:
- Wi-Fi network configurations
- VPN settings
- Email account settings
- Certificate deployment
Deploy Applications
-
Navigate to Apps > macOS
-
Click Add and select app type:
- macOS app (DMG): For .dmg installer files
- macOS app (PKG): For .pkg installer files
- Microsoft 365 Apps: Office suite
- macOS LOB app: Line-of-business apps
-
Configure app assignment to enrolled devices
Configure Compliance Policies
-
Navigate to Devices > Compliance > Policies
-
Click Create policy > macOS
-
Configure compliance settings:
- OS version: Minimum and maximum
- Password requirements: Complexity, length
- Encryption: Require FileVault
- System Integrity Protection: Required
-
Assign to device groups
Troubleshooting
Company Portal Won't Install Profile
Symptoms: Profile download succeeds but installation fails.
Solutions:
- Verify the user has administrator privileges on the Mac
- Check that System Integrity Protection (SIP) is enabled
- Open System Settings > Privacy & Security > Profiles to manually install
- Restart the Mac and try again
- Check for pending macOS updates and install them
Device Not Syncing with Intune
Symptoms: Device shows "Last check-in" with old date/time.
Solutions:
- Open Company Portal > Preferences > Sync
- Verify internet connectivity
- Check that the MDM profile is still installed:
- System Settings > Privacy & Security > Profiles
- Review Console app for MDM-related errors:
- Filter by "mdmclient" process
Automated Enrollment Not Starting
Symptoms: Device goes to normal Setup Assistant instead of organization enrollment.
Solutions:
- Verify device is assigned to Intune in Apple Business Manager
- Check that enrollment profile is assigned to the device group
- Factory reset the device and restart enrollment
- Verify network connectivity during initial setup
- Check serial number matches between ABM and physical device
FileVault Recovery Key Not Escrowed
Symptoms: FileVault is enabled but recovery key not in Intune.
Solutions:
- Verify FileVault profile is deployed with recovery key escrow
- The key escrows on next user login after FileVault enablement
- Check that device was enrolled before FileVault was enabled
- For personal recovery key issues:
sudo fdesetup changerecovery -personal
Common Error Messages
| Error | Cause | Solution |
|---|---|---|
| "Device not supervised" | Feature requires ADE enrollment | Re-enroll via ADE for full management |
| "Profile installation failed" | User not administrator | Grant admin rights or assist with installation |
| "MDM enrollment failed" | Certificate issue | Verify Apple MDM Push certificate is valid |
| "User not authorized" | Enrollment restrictions | Check user group membership and restrictions |
Best Practices
Enrollment Recommendations
- Use ADE for corporate devices: Provides the strongest management and best user experience
- Use User Enrollment for BYOD: Respects user privacy while protecting corporate data
- Configure Setup Assistant carefully: Only show necessary screens to streamline enrollment
- Enable locked enrollment: Prevent users from removing management from corporate devices
- Test profiles with pilot group: Validate configurations before broad deployment
Security Recommendations
- Require FileVault encryption: Protect data on all enrolled devices
- Configure Conditional Access: Require device compliance for Microsoft 365 access
- Enable Gatekeeper: Only allow apps from identified developers
- Configure System Integrity Protection: Never disable SIP
- Deploy managed Apple IDs: For corporate app purchases through ABM
Management Tips
- Use Smart Groups: Create dynamic groups based on device properties
- Monitor compliance: Set up alerts for non-compliant devices
- Plan for OS updates: Test new macOS versions before deploying update policies
- Document your configuration: Keep records of profiles and policies
- Regular audits: Review enrolled devices and remove stale entries
Next Steps
After successfully enrolling macOS devices:
- Deploy essential applications: Microsoft 365, company apps
- Configure security baselines: Implement organization security standards
- Set up Conditional Access: Require compliant devices for resource access
- Enable endpoint security: Configure Microsoft Defender for macOS
- Monitor device health: Use Intune reports and dashboards
Additional Resources
- Microsoft Intune macOS Enrollment Documentation
- Apple Business Manager Documentation
- macOS Platform Guide for MDM
Need help with your macOS Intune deployment? InventiveHQ offers comprehensive Apple device management services, from Apple Business Manager setup to ongoing Intune management. Contact us for a free consultation.